Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Deploying PAWs as Part of a Strategy to Limit Credential Theft and Lateral Movement

via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk on deploying Privileged Access Workstations (PAWs) as a strategy to mitigate credential theft and lateral movement in network security. Delve into various Windows authentication mechanisms, credential storage methods, and common attack scenarios. Learn about the Active Directory Administrative Tier Model, logon restrictions, and traditional jump server solutions. Discover the prerequisites, deployment phases, and models for implementing PAWs, including detailed guidance on setting up Active Directory frameworks, GPOs, and user policies. Gain insights into multi-factor authentication, Protected Users group, and lessons learned from real-world deployments. Understand how PAW implementation complements network segmentation strategies and further limits exposure to security threats. Conclude with practical tips and a Q&A session to enhance your organization's security posture against credential-based attacks.

Syllabus

Intro
WHEN NOT COMPUTERING...
ATTACK SCENARIO #2
WINDOWS LOGON TYPES
LOCAL SAM DATABASE
ACTIVE DIRECTORY DATABASE
LSA SECRETS
CREDENTIAL MANAGER
WINDOWS CREDENTIAL & AUTH ISSUES
STEALING WINDOWS ACCESS TOKENS
WINDOWS CRED & AUTH ISSUES
INTRODUCING PAWS
ACTIVE DIRECTORY ADMINISTRATIVE TIER MODEL
LOGON RESTRICTIONS
TRADITIONAL SOLUTIONS - JUMP SERVERS
PAW PREREQUISITES
PHASES OF DEPLOYMENT
PAW DEPLOYMENT MODELS
DEPLOY PAW ACTIVE DIRECTORY FRAMEWORK
PAW COMPUTER ACCOUNT GPOs
PAW USER GPOS
PAW GPOS - DENY LOWER TIER LOGON
RESTRICTED ADMIN)
PAW SETUP - PHASE 2
MULTI-FACTOR)
PAW SETUP - PHASE 3 (PROTECTED USERS)
LESSONS LEARNED FROM MY DEPLOYMENT
PAW DEPLOYMENT PAIRS WILL WITH NETWORK SEGMENTATION
NETWORK SEGMENTATION (LAYER3)
FURTHER LIMITING EXPOSURE TO CREDENTIAL THEFT AND LATERAL MOVEMENT
CLOSING
QUESTIONS/CONTACT

Reviews

Start your review of Deploying PAWs as Part of a Strategy to Limit Credential Theft and Lateral Movement

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.